To add a sub-location:

  1. Go to Administration > Location Management.
  2. In the Locations page, locate the location you want to add a sub-location to, and click the Edit icon.

Similarly, How do you add a location on Zscaler?


To add a new location:

  1. From the Administration menu, choose Locations.
  2. Click Add New Location. The New Location window appears.
  3. In this window: Enter a Name and optionally, a Description and Zip code. …
  4. Select the Policy that you want to apply to this location. ( Optional)
  5. Click Save.

Additionally, How do I change location on Zscaler?
In the Add Location window, in the Location section:

  1. Name: Enter a name for the location. …
  2. Country: Select the location’s country.
  3. City/State/Province: Enter the location’s city, state, or province, if applicable.
  4. Time Zone: Select the location’s time zone.

How do you add IP address in Zscaler?


To configure the self-service static IP address from the ZIA Admin Portal:

  1. Go to Administration > Static IPs & GRE Tunnels.
  2. Click Add Static IP. The Add Static IP Configuration wizard opens. If you edit an existing configuration, the Edit Static IP Configuration wizard opens.
  3. Under the Source IP tab:

What is sub location?

A Sublocation is a storage location that may represent the entire building or a smaller area of the building or business process.

How do I change servers on Zscaler?

Go to Administration > Servers. In the table, locate the server you want to modify and click the Edit icon. In the Edit Server window, modify fields as necessary. To learn more about each field, see Explicitly Defining Servers.

Does Zscaler change IP address?

The static public IP address of the location. … The update client periodically checks your network’s IP address; if it sees that your IP address has changed, it updates Zscaler with the new IP address. A TLS tunnel. Zscaler supports configuring a TLS tunnel from your edge device to a Zscaler DNS server.

How do you delete a location on Zscaler?


To edit or delete a manual location group:

  1. Go to Administration > Location Management.
  2. Click the Location Groups tab.
  3. Locate the location group in the table and click Edit.

Can you use IPSec VPN to Zscaler from a location with a dynamic IP address?

If your router does not support GRE or if you use dynamic IP addresses, you can configure IPSec VPN tunnels. … Tunneling can provide internal IP address information to Zscaler for use in policy design and logging. Supports locations with dynamic IP addresses.

What is surrogate IP?

An IP address surrogate ties a credential to an IP address and assumes that the IP address is used by only one user at any given time. … This method is required when a client IP address is shared by more than one user at a time, as with multi-user hosts such as Citrix servers.

How many sub locations are there in Kenya?

The divisions are then subdivided into 2,427 locations (mtaa) and then 6,612 sublocations (mtaa mdogo).

Is sublocation a word?

sublo·ca·tion.

How do I fix zscaler connection error?

The device has a firewall or antivirus program blocking Zscaler Client Connector traffic. Contact your administrator for any required configuration changes on the device. To learn more, contact Zscaler Support. The device is connected to a trusted network.

How do I re authenticate my zscaler app?


To configure automatic ZPA reauthentication:

  1. In the Zscaler Client Connector Portal, go to Administration.
  2. From the menu on the left, go to Client Connector Support.
  3. On the App Supportability tab, select the Automatically Attempt ZPA Reauthentication switch.

How do I restart my Zscaler service?

In the Zscaler Client Connector Portal, go to Administration. From the left menu, go to Client Connector Support. On the App Supportability tab, select the Enable End User to Restart Services and Repair App switch.

What is IP Zscaler?

ip.zscaler.com

Use this portal to verify whether your internet access is secured by Zscaler services. This portal also reflects Zscaler’s Data Center to which the user is pointed.

How does Zscaler work?

“Zscaler is a cloud-based information security platform delivered through more than 100 global data centres. To use Zscaler, Internet traffic from fixed locations such as branch offices or factories, roaming devices and mobile devices is routed through Zscaler points of presence before going on to the public Internet.

What is Zscaler VPN?

Zscaler Private Access: A VPN alternative that delivers a zero trust model. Zscaler Private Access (ZPA) is a cloud-delivered, zero trust network access (ZTNA) service that provides secure access to all private applications, without the need for a remote access VPN.

What is XFF header in Zscaler?

An XFF header identifies the IP address of the original client that sent the HTTP request through the proxy server, which can then be leveraged by the Zscaler service to identify the client’s sub-location. So, using the XFF headers, the service can apply the appropriate sub-location policy to the transaction.

How does Zscaler connector work?

It works by establishing zero trust access for server-to-server traffic, east-west traffic in a public cloud, IT/OT networks, and data centers. Cloud Connector can be deployed in Amazon Web Services (AWS), Microsoft Azure, and On-prem hypervisors such as KVM and VMware ESXi.

How do I connect my VPN to Zscaler?


To configure an IPSec VPN to a ZIA Public Service Edge:

  1. Review the supported IPSec VPN parameters.
  2. Add VPN credentials in the Admin Portal.
  3. Link the VPN credentials to a location.
  4. Configure your edge router or firewall to forward traffic to the Zscaler service. See the following configuration guides:

What 3 main forwarding options are available with the zscaler client connector used for the Zia Service choose three?


Zscaler supports the following combinations of traffic forwarding methods:

  • Using Tunneling, PAC Files, Surrogate IP, and Zscaler Client Connector. …
  • Using Tunneling, PAC Files, and Surrogate IP. …
  • Using Tunneling and PAC Files. …
  • Using Tunneling and Surrogate IP. …
  • Using PAC Files to Forward Traffic to a Dedicated Proxy Port.

What is the difference between IPSec and GRE tunnel?

GRE is a tunneling protocol which is used to transport multicast, broadcast and non-IP packets like IPX etc. IPSec is an encryption protocol. IPSec can only transport unicast packets not multicast & broadcast.